IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing IT Security Reports
Alert Logic Gets Hooked on StarLeaf Cloud Video Conferencing and Calling
sponsored by StarLeaf
CASE STUDY: This case study discusses a collaboration solution that was implemented by a cloud security service provider.
Posted: 30 Sep 2015 | Published: 30 Sep 2015


Removing the Complexity and Guesswork from Your PKI Refresh
sponsored by Venafi
WHITE PAPER: This white paper discusses the challenges of PKI refresh and their impact on security. Read on to learn how you can bolster security with a simplified and streamlined PKI refresh process.
Posted: 15 Sep 2015 | Published: 15 Sep 2015


Move Away from Traditional Cybersecurity
sponsored by BitDefender
VIDEO: This brief video gives you a glimpse at how your cybersecurity can look to the future instead of remaining stuck in the past.
Posted: 08 Oct 2015 | Premiered: 20 May 2015


Case Study: A Profile of Cyber-Extortion
sponsored by Akamai
WHITE PAPER: This white paper provides an in-depth look at a cyber-extortion group, showing you what their attacks look like and what you can do to stop them.
Posted: 17 Sep 2015 | Published: 09 Sep 2015


Battling Security Threats from within Your Organization
sponsored by IBM
WHITE PAPER: This white paper explores the risk of insider attacks, both malicious and accidental, and gives tips on how you can secure yourself against them.
Posted: 11 Sep 2015 | Published: 30 Jun 2015


Secure-by-Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.
Posted: 14 Sep 2015 | Published: 22 May 2014


A Modern Disaster Recovery Approach Fit for US Government Security Standards
sponsored by NTT America, Inc.
CASE STUDY: In this business impact summary, find out how one government organization formed a flexible, fast, and cloud-based disaster recovery strategy that held up under strict regulations.
Posted: 17 Sep 2015 | Published: 30 Apr 2015

NTT America, Inc.

Advanced Threat Detection and Remediation: Why it's Needed
sponsored by Hewlett-Packard Company
WHITE PAPER: An effective security program must not only attempt to detect and block incoming threats; it must detect and neutralize successful attacks before the damage is done, too. This white paper explains why advanced threat detection is now a necessary part of any cyber security program.
Posted: 09 Sep 2015 | Published: 09 Sep 2015

Hewlett-Packard Company

Case Study: Oxford University Hospitals Cuts Waste with Single Sign-On
sponsored by Imprivata
WHITE PAPER: Access this case study to discover how Oxford University Hospitals sped up the process of secure EPR access, cutting out waste and freeing up more time for patient care.
Posted: 25 Sep 2015 | Published: 31 Dec 2014


Enhanced Access Control for the Healthcare Industry
sponsored by Imprivata
WHITE PAPER: This report takes a look at security designed for healthcare, discussing what single sign-on, virtual desktop access and more looks like when it complies with healthcare needs.
Posted: 25 Sep 2015 | Published: 31 Mar 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement